Thursday, 31 January 2013
Thursday, 24 January 2013
Friday, 18 January 2013
Cyber cafes
2.10 -Finding a cyber cafe.There is a cyber cafe in London on Camden high street Nw1
with 20 computers available with printers scanners and video conference for £1 per hour, its open from 8.00am to 11.00pm. this cyber cafe is the nearest one to me (Bedford).
There is around 20 cyber cafes in Paris to choose from
all of them having a mixture of other facilities to use.
2.11 - Internet safety
There are two main attacks used by hackers workstation & the network
There are 3 ways to hack the workstation:
Instant key logger- the software/hardware captures all the keystrokes that you type on the computer, they could end up with your email address and password!
Network sniffing software- if you fill out your login credentials on a site that is not encrypted, your login details can be read by the hacker via the sniffer capture files at a later time. When logging into a email account, the credentials are generally encrypted. Encrypted data and cannot be read by the sniffer
Phising scams- This is commonly the result of receiving spam emails
Shoulder surfing , you get directed to an identical web page where you would put your credentials.
2.13- keeping intouch
Its better to use online albums to show all your friends what you've been doing rather than social networking sites as social networking sites
2.15 advantages of cloud computing:
with 20 computers available with printers scanners and video conference for £1 per hour, its open from 8.00am to 11.00pm. this cyber cafe is the nearest one to me (Bedford).
There is around 20 cyber cafes in Paris to choose from
all of them having a mixture of other facilities to use.
2.11 - Internet safety
There are two main attacks used by hackers workstation & the network
There are 3 ways to hack the workstation:
Instant key logger- the software/hardware captures all the keystrokes that you type on the computer, they could end up with your email address and password!
Network sniffing software- if you fill out your login credentials on a site that is not encrypted, your login details can be read by the hacker via the sniffer capture files at a later time. When logging into a email account, the credentials are generally encrypted. Encrypted data and cannot be read by the sniffer
Phising scams- This is commonly the result of receiving spam emails
Shoulder surfing , you get directed to an identical web page where you would put your credentials.
2.13- keeping intouch
- Social networking site (facebook,twitter)
- blog
Its better to use online albums to show all your friends what you've been doing rather than social networking sites as social networking sites
2.15 advantages of cloud computing:
Tuesday, 8 January 2013
Renewing your passport
You can immediatley recognise that a website is secure by simply looking in the address bar , if it says https its a secure site if it just says http then it is not.
The very top urls that come up on google search are advertisements and they pay to be at the top of the search.
When renewing your passport you need to fill in the form but also have the appropriate documents:
The very top urls that come up on google search are advertisements and they pay to be at the top of the search.
When renewing your passport you need to fill in the form but also have the appropriate documents:
- Full birth certificates
- Photo of you
- Marriage certificate (if applys to you)
Subscribe to:
Posts (Atom)